Remove Authentication Remove Examples Remove Hardware Remove Linux
article thumbnail

Technology Short Take 176

Scott Lowe

Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Servers/Hardware Menno Finlay-Smits shares information on reducing fan noise on Intel NUCs. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process.

Linux 112
article thumbnail

Wireless Security | Roadmap to Securing Your Infrastructure

Linux Academy

Shortly after, the WiFi Alliance released WPA3, which includes many security improvements over WPA2, including: Protection against dictionary attacks via the Simultaneous Authentication of Equals (SAE), which replaces the WPA2 pre-shared key mechanism. This is a great example of being proactive in security. 2 and implement an 802.1x

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 122

Scott Lowe

Servers/Hardware. Bruce Schneier writes about how some Chinese hackers are bypassing RSA software token authentication (the title is a bit more broad, implying other forms of two-factor authentication are affected, but the article focuses on attacks against the use of RSA software tokens). Cloud Computing/Cloud Management.

article thumbnail

Technology Short Take 107

Scott Lowe

” Servers/Hardware. Christian Kellner provides a brief reminder that not all USB-C ports are Thunderbolt ports, and updates everyone on the status of bolt (Linux utility for working with Thunderbolt ports and peripherals). Matt Oswalt shares some details on how NRE Labs implements “curriculum-as-code.”

Vmware 60
article thumbnail

Technology Short Take 155

Scott Lowe

Along those lines, one of their latest articles discusses how to achieve identity-based mutual authentication leveraging eBPF. Servers/Hardware. Bashayr Alabdullah provides an example of building your own admission controllers in Kubernetes using Go. This will become even more useful, in my opinion, when Linux support is added.

article thumbnail

Technology Short Take #59

Scott Lowe

Cumulus VX, if you aren’t aware, is a community-supported virtual appliance version of Cumulus Linux aimed at helping folks preview and test “full-blown” Cumulus Linux (which, of course, requires compatible hardware). Servers/Hardware. Nir Yechiel posted an article on using the Cumulus VX QCOW2 image with Fedora and KVM.

Vmware 60
article thumbnail

Technology Short Take #59

Scott Lowe

Cumulus VX, if you aren’t aware, is a community-supported virtual appliance version of Cumulus Linux aimed at helping folks preview and test “full-blown” Cumulus Linux (which, of course, requires compatible hardware). Servers/Hardware. Nir Yechiel posted an article on using the Cumulus VX QCOW2 image with Fedora and KVM.

Devops 60